Skip to Content

How-Tos

This section provides technical instructions on how to configure desktops, laptops, tablets, and other devices securely to reduce the odds that a system may be compromised or sensitive data lost or stolen. Where possible, LSAIT-supported desktops, servers, and network have best practices integrated into the services. However, some solutions can not be enforced through technologies for the entire college. This information is provided for faculty and staff and their IT departments as a reference for solutions that have worked successfully elsewhere in the College and University.

For Faculty, Staff, and Students

  • Adding a Mac OS X Computer to Active Directory
  • Configuring a Secure iPad
  • Creating a Disaster Recovery Plan
  • Data Management Plan
  • De-Identifying HIPPA Data
  • Encrypting iWork 2009 Documents
  • Encrypting Office 2007 Files
  • Encrypting Sensitive Data using Mac OSX
  • Installing Google Drive Sync client on either Mac OS X or Windows 7
  • Installing M+Box Sync client on either Mac OS X or Windows 7
  • Joining Macs to Active Directory How-To
  • Reporting Spam/Reporting Phish
  • Research Data Registration/Building Access Form
  • Research or Scholarship Backup Plan┬áTemplate
  • Securing Sensitive Data: CCNs or SSNs

For IT Professionals

Procedures

  • Adding a Mac OS X Computer to Active Directory
  • Creating a Disaster Recovery Plan
  • Deleting Files, Folders, and Unused Disk Space Securely
  • Enabling a disk password on OSX
  • Enabling BitLocker on Windows Vista Without a TPM Chip Installed
  • Encrypting Documents with BitLocker on Your Vista Computer
  • Encrypting iWork 2009
  • Encrypting Office 2007 Files
  • Encrypting Sensitive Data using Mac OSX
  • Encrypting the Full Disk on Fedora 14
  • Encrypting the Full Disk on Windows Using TrueCrypt (no longer supported)
  • Joining Macs to Active Directory How-To
  • Retaining and Removing Data on Copiers and Multifunction Devices
  • Securing Copier and Multifunction Devices
  • Securing Konica Minolta Biz Hub Multi-function printer (PDF)
  • Securing Network Printers in LSA
  • Triaging a Compromised Unix Workstation
  • Using the Bitlocker Drive Preparation Tool

Other Documentation

  • Administrators Guide Bitlocker Drive Preparation Tool
  • Data Management Plan
  • Disaster Recovery Plan Template
  • Research or Scholarship Backup Plan Template